PORTFOLIO PROJECT / HoneyBOT

 Description Hands-On Project – HoneyBOT® HoneyBOT® is a simple honeypot for beginners to use. Honeypots can give you a good idea of how many people are probing your machine for weaknesses. Without a honeypot, you may not be able to tell if anyone is scanning your machine. In this example, you will use your Web browser to generate some entries in HoneyBOT. You will try to make FTP and HTTP connections with your own computer. The honeypot will record the IP address of the remote machine that is scanning your computer and each port that was scanned. Download HoneyBOT from http://www.atomicsoftwaresolutions.com/honeybot.php (Links to an external site.) Links to an external site. . Click on the Download link in the left-hand menu. Click on the appropriate “here” link to download the latest version of HoneyBOT. Click Save. Select your downloads folder. Browse to your downloads folder. Double-Click HoneyBOT_018.exe. (The version number may be different as newer releases become available.) Click Run, Next, I Accept, Next, Next, and Next. Check Create desktop icon. Click Next, Install, and Finish. Press the Start button or click File, and Start. HoneyBOT may ask you to select an adapter if you have multiple NICs in your computer; select your current IP address. (It could be a non-routable IP that starts with “192.168” or it could be a typical IP address.) Click OK. Take a screenshot showing the total number of sockets loaded in the bottom status bar. Click Start. Open a Web browser and go to FTP://[Your IP Address]. (Replace Your IP Address with the IP address that is being used by HoneyBOT. In this example, it was ftp://155.97.74.45.) When prompted for a username, enter your first name. Enter your last name for the password. (Entering your first and last name as username and password will record them in the HoneyBOT log. You don’t really have an FTP server running. It’s being “faked” by HoneyBOT.) Open a Web browser and go to HTTP://[Your IP Address]. (Replace Your IP Address with the IP address that is being used by HoneyBOT.) Return to HoneyBOT and take a screenshot. Double-click on one of the entries with the local port listing 21. (The remote IP and local IP should be the same.) Take a screenshot of the HoneyBOT log entry showing your first and last name being used to access an FTP server. Submit your Screenshots and answer the following questions: What impact would more open ports have on the ability of your honeypot to attract hackers? Can hackers tell that you have a honeypot running? Do they have honeypots for spammers to keep them from harvesting emails from your webpages? Do you think law enforcement agencies (e.g., CIA, FBI, NSA, etc.) in the United States run honeypots to track criminal behavior? Directions: The content of the paper must be eight to ten pages in length and formatted according to the CSU-Global Guide to Writing and APA Requirements (Links to an external site.) Links to an external site. . A minimum of six references (in addition to course materials, like the textbook or articles). At least two of these being peer-reviewed articles. The CSU-Global Library is a good place to search for credible, scholarly sources.

#PORTFOLIO #PROJECT #HoneyBOT

Share This Post

Email
WhatsApp
Facebook
Twitter
LinkedIn
Pinterest
Reddit

Order a Similar Paper and get 15% Discount on your First Order

Related Questions

Assignment Rules: Open book and notes assignment This homework tests

Assignment Rules:Open book and notes assignment This homework tests your knowledge of File Handling, use of String methods, and use of Sets. Adhere to the naming conventions discussed in class for variable names, program name and function names Use meaningful names for variables, functions etc If there are two words

Develop a presentation for nursing colleagues highlighting the fundamental principles of care coordination. Include community resources, ethical

Develop a presentation for nursing colleagues highlighting the fundamental principles of care coordination. Include community resources, ethical issues, and policy issues that affect the coordination of care. To prepare, develop a detailed narrative script for your presentation, approximately 3-4 pages in length This assessment provides an opportunity for you to

Some writers have suggested that there is an inconsistency between

 Some writers have suggested that there is an inconsistency between the doctrine of Paul (as found in Gal 2:15-16; Rom 3:20, 28) and the doctrine of James (as found in Jas 1:22-25; 2:8, 14-17, 21-24). Do you believe these doctrines can be reconciled? If so, how would you reconcile them? 

Henderson Need Theory Evaluation

Description This assignment complete the analysis of a theory by evaluating it’s usefulness in practice. Instructions: Using the same theory as the previous assignments complete an evaluation using the questions below as subheadings. Use narrative writing, follow APA writing guidelines, and include acknowledgement of sources. You must have a title

Select ONE of the following fugal agents for your assignment.

Select ONE of the following fugal agents for your assignment. Aspergillus, Tinea pedis, Candida albicans, Coccidioides, Pneumocystis jirovecii, Blastomyces, Cryptococcus neoformans, Histoplasma, Tinea corporis Step 2 Research the chosen fungal agent to examine the anatomical structures and diseases associated with it.   Step 3  Using the template below answer the following

In 500 words describe four of the Standards of Practice

  In 500 words describe four of the Standards of Practice for Culturally Competent Nursing Care, and exemplify them with experiences in the clinical area. It should include at least 3 academic sources.    Standard 3. Knowledge of Cultures  Standard 5. Cultural Competence in HealthCare Systems and Organizations  Standard 8.

criminology: Serial killer TED BUNDY

SERIAL KILLER ESSAY: Your essay will be evaluated on the following; 1. How many victims the killer is believed to have murdered. 2. Their modus operandi. 3. Their motivation. 4. Their psychiatric diagnosis, if any. 5. How they came to be apprehended by Police. • Your essay will analyze one

Conduct online search to locate current healthcare accrediting bodies. Compare

Conduct online search to locate current healthcare accrediting bodies. Compare and contrast them with The Joint Commission (TJC) with respect to Electronic Health Record requirements and communication with patients through web portals or other means. Your initial post comprising a minimum of 250 words should have 2-3 credible sources/peer reviewed

EOL Project Exploration (Lab) I’ve been following the EOL project since prior to 2012, as it was first developing. In November of 2018, its website had had a big overhaul. Several positive changes wer Nursing Assignment Help

EOL Project Exploration (Lab)I’ve been following the EOL project since prior to 2012, as it was first developing. In November of 2018, its website hadhad a big overhaul. Several positive changes were made, at that time. However, I regret that some of the old informationabout ELO (that was available since

Discussions: The days of working on an individual basis in

  Discussions:  The days of working on an individual basis in the workplace are over. Positions that are not involved in a team, committee, or work group at some point during the year are extremely rare. Unless formal training is provided for a team, it is common to find dysfunction

Write 2 pages on Key Performance Indicators (KPIs) of Amazon.

Write 2 pages on Key Performance Indicators (KPIs) of Amazon. Examples can be:  Revenue growth. Revenue per client. Profit margin. Client retention rate. Customer satisfaction For reference, Amazon Key Performance Indicators (Amazon KPIs) include conversion rate, shopping cart abandonment rate, associated shipping rate trends, competitive price trends, etc. 

Students will submit a research paper exploring some facet of

 Students will submit a research paper exploring some facet of the criminal justice system in depth.  Examples include: Researching programs or models of policing or corrections Comparing U.S. crime strategies or issues with other nations Exploring new technological advances that have changed the justice system  The paper should consist of

“The trade war between the United States and China that

“The trade war between the United States and China that escalated in 2019 was the outcome of the mercantilist policy adopted by these countries. Give your opinion on this statement with proper use of facts and examples.” OR, “Describe the trade theory of Mercantilism, give examples, and then see if

To complete the project, you will submit the final version

 To complete the project, you will submit the final version of your database. Before you begin work on your database, make sure to review your instructor’s feedback on the original Client Request Worksheet, making any necessary changes. Once your Client Request is finalized, review the CIS 225 Project Guidelines and

Windows/LinkedIn

Windows/ Linkedin Part 3. an in-depth qualitative AND quantitative analysis of how environmental variables have impacted the firm in the past and the extent of that impact (e.g., correlation and regression analysis of AT LEAST 5-7 variables for each category of the PEST) Political Economic Sociocultural Technological Please use scholarly